ANYRUN Safebrowsing Extension - Analyse Any Malicious URL for Free

Safebrowsing enables security analysts to interact with the entire attack chain, monitor network activity, and uncover hidden threats in a controlled, isolated environment. According to ANY.RUN Reports, Safebrowsing integrates a Network Inspector, accessible in the upper-right corner of the interface, offering comprehensive real-time analysis of network traffic, HTTP requests, and security threats. This tool is designed to help businesses and individuals combat phishing attempts, malicious redirects, and hidden malware by providing a secure, interactive environment for analyzing suspicious links. Safebrowsing provides a controlled environment where security analysts can explore the entire attack chain and uncover hidden threats. In this analysis, Safebrowsing allows analysts to bypass these barriers through automated interactivity, providing a direct path to analyze phishing attempts hidden behind CAPTCHA walls. For deeper security assessments, the full version of ANY.RUN’s browser extension provides interactive sandbox analysis capabilities. Faster Threat Analysis: The streamlined process allows security teams to quickly assess link behavior in a safe, full-size virtual browser. ANY.RUN, a global leader in Interactive Malware sandboxes, has upgraded its browser extension to include the Safebrowsing feature, which is now available for free to all users. The link initially presents a Cloudflare CAPTCHA page, a common evasion tactic used to prevent automated security tools from detecting fraudulent activity. Enhanced Employee Safety: Businesses can test unknown URLs in an isolated environment before opening them on corporate devices, reducing risks of malware infections and phishing attacks. By right-clicking the suspicious URL, the link is instantly opened within ANY.RUN’s isolated browser, eliminating the need for manual copying and pasting. This includes features like file and link analysis on virtual machines, detailed threat reports, and extended session durations for comprehensive investigations. Security teams can now analyze suspicious URLs instantly through ANY.RUN’s browser extension. Using Suricata rules, analysts can quickly detect phishing domains, track attacker infrastructure, and mitigate security risks with enhanced precision. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. The Network Inspector feature further enhances investigations by offering real-time monitoring of network connections, HTTP requests, and potential threats identified by Suricata rules. Safebrowsing operates as a fully functional virtual browser within the cloud, allowing users to safely interact with potentially harmful URLs. Right-clicking a suspicious link and selecting “Safebrowsing” automatically opens the URL in an isolated environment, streamlining the investigation process. To use Safebrowsing for free, users must register for an ANY.RUN account and install the browser extension.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 13 Feb 2025 16:05:20 +0000


Cyber News related to ANYRUN Safebrowsing Extension - Analyse Any Malicious URL for Free

ANYRUN Safebrowsing Extension - Analyse Any Malicious URL for Free - Safebrowsing enables security analysts to interact with the entire attack chain, monitor network activity, and uncover hidden threats in a controlled, isolated environment. According to ANY.RUN Reports, Safebrowsing integrates a Network Inspector, ...
5 months ago Cybersecuritynews.com
Microsoft Defender XDR False Positive Leads to Massive Data Leak of 1,700+ Sensitive Documents - According to a ANYRUN report shared with Cyber Security News , this error triggered a sudden influx of Adobe Acrobat Cloud links being uploaded to their sandbox for analysis. “We saw a sudden inflow of Adobe Acrobat Cloud links being uploaded to ...
3 months ago Cybersecuritynews.com
Malicious Chrome extensions can spoof password managers in new attack - In SquareX's demonstration, the attackers impersonate the 1Password password manager extension by first disabling the legitimate one using the 'chrome.management' API, or if the permissions aren't available, user interface manipulation tactics to ...
5 months ago Bleepingcomputer.com
New Polymorphic Attack That Mimic Any Chrome Extension Installed On The Browser - This newly discovered “polymorphic extension attack” creates pixel-perfect replicas of legitimate extensions’ icons, HTML popups, and workflows, making it nearly impossible for users to distinguish them from authentic extensions. ...
5 months ago Cybersecuritynews.com
SquareX Unveils Polymorphic Extensions that Morph Infostealers into Any Browser Extension - Password Managers, Wallets at Risk - In addition to the polymorphic attack, SquareX was also the first to discover and disclose multiple extension-based attacks, including Browser Syncjacking, the Chrome Store consent phishing attack leading to Cyberhaven’s breach and numerous other ...
5 months ago Cybersecuritynews.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
CVE-2022-49999 - In the Linux kernel, the following vulnerability has been resolved: ...
1 month ago
Hackers Stolen $500,000 in Crypto Assets by Weaponizing AI Extension - By publishing their malicious extension with a recent update date of June 15, 2025, compared to the legitimate extension’s May 30, 2025 update, the cybercriminals successfully manipulated their package to appear fourth in search results while ...
1 month ago Cybersecuritynews.com
CVE-2019-11725 - When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe ...
2 years ago
CVE-2024-34714 - The Hoppscotch Browser Extension is a browser extension for Hoppscotch, a community-driven end-to-end open-source API development ecosystem. Due to an oversight during a change made to the extension in the commit ...
1 year ago Tenable.com
Bitwarden Free vs. Premium: Which Plan Is Best For You? - Bitwarden Free provides a secure vault for credentials, credit cards, identification documents and text files. The Bitwarden Premium plan costs $10 per year and offers additional capabilities such as encrypted file attachment sharing, advanced vault ...
1 year ago Techrepublic.com
Atlas VPN Free vs. Premium: Which Plan Is Best For You? - When VPN providers offer free versions, you may be inclined to stick with that version. Atlas VPN Free is a lifetime-free version of the Atlas VPN service, which allows users to enjoy VPN services in four locations. In comparison, Atlas VPN Premium ...
1 year ago Techrepublic.com
The zero-day that could've compromised every Cursor and Windsurf user - In a recent post Yomtom explains that while examining the build process behind OpenVSX, the open-source marketplace powering extensions for tools like Cursor, Windsurf, VSCodium, and others, he discovered a critical flaw. Dubbed VSXPloit: A single ...
4 weeks ago Bleepingcomputer.com
Beware of Free File Word To PDF Converter That Delivers Malware - The FBI has issued an urgent warning about the rising threat of malicious file conversion tools that are being used to spread malware across the United States. The FBI’s Denver Field Office is actively collecting reports from potential victims ...
4 months ago Cybersecuritynews.com
Highly Obfuscated .NET sectopRAT Mimic as Chrome Extension - Meanwhile, background.js functions as an intermediary to bypass browser security policies, transmitting the stolen data from content.js to the command-and-control (C2) server. The emergence of a highly obfuscated .NET-based Remote Access Trojan (RAT) ...
5 months ago Cybersecuritynews.com
VSCode extensions with 9 million installs pulled over security risks - Microsoft has removed two popular VSCode extensions, 'Material Theme – Free' and  'Material Theme Icons – Free,' from the Visual Studio Marketplace for allegedly containing malicious code. One of the researchers, Amit Assaraf, says ...
5 months ago Bleepingcomputer.com
CVE-2023-40004 - Missing Authorization vulnerability in ServMask All-in-One WP Migration Box Extension, ServMask All-in-One WP Migration OneDrive Extension, ServMask All-in-One WP Migration Dropbox Extension, ServMask All-in-One WP Migration Google Drive ...
1 year ago
SIEM agent being used in SilentCryptoMiner attacks | Securelist - The most interesting action in this attack was the implementation of unusual techniques like using an SIEM agent as backdoor, adding the malicious payload to a legitimate digital signature, and hiding directories containing malicious files. The ...
10 months ago Securelist.com
15 Best Bandwidth Monitoring Tools in 2025 - By providing real-time data on network usage, bandwidth monitoring tools enable proactive management and quick resolution of issues that could impact network performance. It provides real-time monitoring of network performance, traffic analysis, and ...
2 weeks ago Cybersecuritynews.com
5 Free Online Brand Protection Software Tools: Pros and Cons - Free or open-source software does exist that can help organizations look for and investigate deceptive websites spoofing their brand. On the other hand, few free tools exist that allow one to take action against online brand impersonation attacks. To ...
1 year ago Securityboulevard.com
URL Hunting: Proactive Cybersecurity Designed to Improve Outcomes - Lately, our sales teams have found a message that's resonating within the business community: IT administrators are looking for more proactive ways to identify and evaluate threats within their company's email data. They want to be able to extend ...
1 year ago Cyberdefensemagazine.com
VS Code Extension Weaponized With Two Lines of Code Leads to Supply Chain Attack - A sophisticated supply chain attack has compromised ETHcode, a popular Visual Studio Code extension for Ethereum development, through a malicious GitHub pull request that required just two lines of code to weaponize the trusted software. The attack, ...
1 month ago Cybersecuritynews.com
CVE-2024-49253 - Relative Path Traversal vulnerability in James Park Analyse Uploads allows Relative Path Traversal.This issue affects Analyse Uploads: from n/a through 0.5. ...
9 months ago Tenable.com
Any.RUN Sandbox Now Expanded to Analyze Linux Malware - The ANY.RUN sandbox has now been updated with support for Linux, further enhancing its ability to provide an isolated and secure environment for malware analysis and threat hunting. ANY.RUN allows malware analysts, SOC members, and DFIR team members ...
1 year ago Gbhackers.com